Sciweavers

1477 search results - page 59 / 296
» Token flow control
Sort
View
ISCC
2003
IEEE
15 years 6 months ago
Controlling Bursts in Best-effort Routers for Flow Isolation
In today’s Internet a user can be adversely affected by other users that overload the router. To address this problem, routers need to provide flow isolation. In this paper, we...
Miguel A. Ruiz-Sánchez, Walid Dabbous
113
Voted
CORR
2007
Springer
98views Education» more  CORR 2007»
15 years 23 days ago
Normalisation Control in Deep Inference Via Atomic Flows
We introduce ‘atomic flows’: they are graphs obtained from derivations by tracing atom occurrences and forgetting the logical structure. We study simple manipulations of atomi...
Alessio Guglielmi, Tom Gundersen
116
Voted
ESOP
2011
Springer
14 years 4 months ago
Typing Local Control and State Using Flow Analysis
Programs written in scripting languages employ idioms that confound conventional type systems. In this paper, we highlight one important set of related idioms: the use of local con...
Arjun Guha, Claudiu Saftoiu, Shriram Krishnamurthi
95
Voted
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
15 years 4 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
75
Voted
ACCV
2009
Springer
15 years 7 months ago
Crowd Flow Characterization with Optimal Control Theory
Abstract. Analyzing the crowd dynamics from video sequences is an open challenge in computer vision. Under a high crowd density assumption, we characterize the dynamics of the crow...
Pierre Allain, Nicolas Courty, Thomas Corpetti